Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

4/16/24, 2:35 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)

Compulsory Internal Assignment (CBCS SEMESTER


PATTERN) Upto C23 Batch

Welcome : SANGEETH P T (A22105PCI6110)


Subject Name : ADVANCED INFORMATION SECURITY(SPCI203) - Assessment - 2 Menu

1. CHAP stands for

Challenge Handshake Authentication Protocol


Challenge Hardware Authentication Protocol
Circuit Hardware Authentication Protocol
Circuit Handshake Authentication Protocol

2. Challenge Handshake Authentication Protocol (CHAP) provides greater security than

Network Control Protocol


Link Control Protocol
High-level Data Link Protocol
Password Authentication Protocol

3. The information that gets transformed in encryption is

Plain Text
Parallel Text
Encrypted Text
Decrypted Text

4. The newest PPP authentication protocol with MS CHAP

PAP
CHAP
EAP
CHAP V3

5. A network protocol that provides security to networks against unauthorized access.

RADIUS
ARP
EAP
PAP

www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzVDBsZklvNDI4UXNVMXhuSUFjTVhXWUZibGE3T1JSS2… 1/4
4/16/24, 2:35 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)

6. A user/session authentication process that permits a user to enter one name and password in
order to access multiple applications.

Secure Sign On
Session Sign
Single Sign On
Single Sign In

7. To access a specific asset the KDC provides.

Ticket
Local
Token
User

8. IPSec is designed to provide security at

Transport Layer
Network Layer
Application Layer
Session Layer

9. VPN stands for

Virtual Private Network


Virtual Paged Network
Virtual Page Negotiation
Varied Packet Network

10. The most common AAA protocol is

TCP/IP
RADIUS
Telnet
PPP

11. Regression testing is a major part of which of the life cycle?

Waterfall model
V model
Iterative model
Spiral Model

12. SDLC stands for

System Design Life Cycle


Software Design Life Cycle
System Development Life Cycle
Software Development Life Cycle

13. Validation is the responsibility of the

www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzVDBsZklvNDI4UXNVMXhuSUFjTVhXWUZibGE3T1JSS2… 2/4
4/16/24, 2:35 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)

Developer
Designer
Tester
QA Team

14. In Cryptography, the process of transforming messages is to make them secure and immune
to

Change
Idle
Attacks
Defend

15. ESP provide

Source authentication
Privacy
Data Integrity
All of the Above

16. The COCOMO model is used for

Software Design
Software Cost Estimation
Software Cost Approximation
Software Analysis

17. The Advanced Encryption Standard (AES) was designed by

National Institute of Standards and Technology


IBM
HP
Intel

18. In Cryptography, the original message before being transformed is called

Simple Text
Plain Text
Cipher Text
Empty Text

19. The art of breaking ciphers

Cryptology
Cryptography
Cryptanalysis
Crypting

20. Transposition cipher involves

Replacement of blocks of text with other blocks


Replacement of characters of text with other characters

www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzVDBsZklvNDI4UXNVMXhuSUFjTVhXWUZibGE3T1JSS2… 3/4
4/16/24, 2:35 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)

Strict row to column replacement


Some permutation on the input text to produce cipher text

SAVE

www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzVDBsZklvNDI4UXNVMXhuSUFjTVhXWUZibGE3T1JSS2… 4/4

You might also like